Sciweavers

3426 search results - page 668 / 686
» Self-identifying sensor data
Sort
View
SASN
2003
ACM
14 years 1 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
PDP
2002
IEEE
14 years 1 months ago
A Fault-Tolerant Reservation-Based Strategy for Scheduling Aperiodic Tasks in Multiprocessor Systems
Periodic and aperiodic tasks co-exist in many realtime systems. The periodic tasks typically arise from sensor data or control loops, while the aperiodic tasks generally arise fro...
Chun-Hua Yang, Geert Deconinck
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
14 years 1 months ago
Robust stability of multi-hop control networks
Abstract— We propose formal models for analyzing robustness of multi-hop control networks, where data from sensors to controllers and from controllers to actuators is sent throug...
Gera Weiss, Alessandro D'Innocenzo, Rajeev Alur, K...
HUC
2009
Springer
14 years 1 months ago
Controlling Error Propagation in Mobile-Infrastructure Based Localization
Mobile infrastructure consists of one or more sensors in a fixed configuration on a mobile platform. By moving the mobile platform in the environment and attaching a set of stat...
Ying Zhang, Juan Liu
AVBPA
2001
Springer
146views Biometrics» more  AVBPA 2001»
14 years 29 days ago
Information Fusion in Biometrics
User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric tra...
Arun Ross, Anil K. Jain, Jian Zhong Qian